Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2009 Issue 2
cpk shu zi qian ming he mi yue jiao huan xie yi
nan xiang hao ; li wei gang
..............
page:1
A Research on Server Roaming for Mitigating DDOS Attacks
YANG Jing;ZHANG Feng-bin
..............
page:3
Research on Fast Handover for Mobile IPv6
YANG Jian;GAO Jian-ling
..............
page:7
Performance Improvement in The Realization of Mobile IPSec VPN
HUANG Xiao-gang
..............
page:10
The Research of Client Authentication In Mobile SSL VPN
CHEN Li
..............
page:13
Experiment of SPA Attack Against RSA
FAN Li-heng;XIANG Kai-quan;ZHAO Qiang;CHEN Kai-yan
..............
page:16
Research on Digital Watermark Algorithm for Spatial Domain Based on Histogram
NIU Wan-hong;YAN Hui-qin
..............
page:19
A Improved Digital Watermarking Based on the B-SVD
ZHANG Deng-yin;LIU Wan
..............
page:22
An Image Encryption Algorithm Based on Chaotic Theory
YANG Yi-mei;YANG yu-jun
..............
page:25
Semi-Fragile Watermarking Algorithm for Color Image Accept JPEG
WANG Kong-qing;WANG Xi-chang;LIU Jiang
..............
page:29
Fuzzy C Means Clustering Algorithm Based on Particle Swarm Optimizing
XIN Hai-ming;TAO Zhi-sui
..............
page:33
The Choice of Watermark Embedded Region Based on Edge Detection
YUAN Bao-ling;XIA Han-zhu;CHEN Er-lei
..............
page:36
Research and Improvement of BM Pattern Matching Algorithm Based Instrusion Detection System Snort
WANG Hao;ZHOU Xiao-feng
..............
page:38
The Research for Load Balancing Technology of Bigtable System
Wang Ying-dong;Kuang Yi;Fei diang-tao
..............
page:41
Design and Implementation of a New Steganography Method Based on the Chinese Interpunction
CHEN Tian-ping;ZHENG Lian-qing;WANG Zhan-feng;YIN Chen-xiao
..............
page:44
Reserch of Security Database Based on Multi-layer Intrusion Tolerance
LI Tao
..............
page:45
Research on Active-network Adaptive Intrusion Response System Based on Mobile Agents
LI Hong-xia;Wang Guang;Sun Ning;Liu La-mei
..............
page:49
A Multi Domain Security Trust Based Access Control Model
Zhang Cheng-bin;Liao Zhen-song
..............
page:53
Analysis and Research on the Technology of Flow Filtration in Firewall
GENG Feng-rui;GAO Zhong-he;LI Hong-wei
..............
page:57
Design and Implementatj On of Firewall Based on Linux for Defending DDoS Attacks
CONG Hui-yuan
..............
page:60
Application Research of Enhancement Computer Startup Authentication by Using GRUB
WANG Bao-ping;Cheng Xin-Dang;Zhang Xin-Gang
..............
page:63
Improvement of Kerberos Agreement Based on Dynamic Password System
HUANG Jian-hua;HE Xi
..............
page:66
Research on Component Technique and Software Agent
CHEN Xiao-xiang
..............
page:70
Research of Data-Structure Construction Based on PMI Application
LIANG Bing;LIAO Xiang-bai
..............
page:74
The Study of Alert Aggregation
HU Zhen-hua;ZHANG Yong-sheng;LU Yi-jun;Xu Zhen
..............
page:77
Design and Implementatj On of Web Database for Computer Forensics Cases
ZHOU Min;GONG Jian;FU Guo-yu
..............
page:81
The Research for the Security Problem of Electronic Commerce
DING Xue-jun
..............
page:83
zheng zhi hu lian wang di su zhi feng bu shi qing ke chi fan
qu ding
..............
page:113
Countermeasures of Diagnosis on the Fault of the Colleges and Universities Campus Network
Hu Ming-hua
..............
page:110
shi wen xuan yi
qu ding
..............
page:108
wei ruan yu emc xin xi an quan shi ye bu rsa lian shou bao hu shu ju an quan
..............
page:107
hillstone zhu shi jia zhuang dian li gong si ying zao jian shi wang luo
..............
page:106
ipc-2402 zai xiao yuan yi ka tong xi tong zhong de ying yong
luo wei
..............
page:105
jie pu ssl vpn wang guan ji shu zong shu
he jian feng
..............
page:102
A Solution of Information Security for Enterprise Intranet Endpoint Access Control Policies Base on Symantec Sygate Enterprise Protection(SEP)
PANG Da-wei;JIANG Tao
..............
page:99
Construction of Digital Campus Resources Security and Data Backup System
XU Jun;WEI Zi-li
..............
page:96
Application of DES Encryption Algorithm in Banking Business
CHEN Jing;SHANG Xian-lian;GU Chen-yu
..............
page:93
Exploration of Constructing Military Information System Security Architecture
FAN Li
..............
page:90
Solution to DDoS Attack Against Small Business Websites
LI Jian;GUO Xin
..............
page:87